发明名称 |
DETECTING SECURITY VULNERABILITIES ON COMPUTING DEVICES |
摘要 |
Identifying security vulnerabilities on computing devices by gathering information about a first software application with which a computing device is configured, selecting, using any of the information, an attack specification from a set of predefined attack specifications, attacking the first software application on the computing device with an attack that is in accordance with the selected attack specification, identifying a post-attack condition associated with the first software application, determining whether the post-attack condition is consistent with a predefined security vulnerability, and performing a predefined action associated with the predefined security vulnerability responsive to determining that the post-attack condition is consistent with the predefined security vulnerability, where the gathering, selecting, attacking, identifying, determining, and performing are performed by a second software application during execution of the second software application on the computing device. |
申请公布号 |
US2014373158(A1) |
申请公布日期 |
2014.12.18 |
申请号 |
US201313920540 |
申请日期 |
2013.06.18 |
申请人 |
International Business Machines Corporation |
发明人 |
Hay Roee;Kalman Daniel;Saltzman Roi;Tripp Omer |
分类号 |
G06F21/57 |
主分类号 |
G06F21/57 |
代理机构 |
|
代理人 |
|
主权项 |
1. A method for identifying security vulnerabilities on computing devices, the method comprising:
gathering information about a first software application with which a computing device is configured; selecting, using any of the information, an attack specification from a set of predefined attack specifications; attacking the first software application on the computing device with an attack that is in accordance with the selected attack specification; identifying a post-attack condition associated with the first software application; determining whether the post-attack condition is consistent with a predefined security vulnerability; and performing a predefined action associated with the predefined security vulnerability responsive to determining that the post-attack condition is consistent with the predefined security vulnerability, wherein the gathering, selecting, attacking, identifying, determining, and performing are performed by a second software application during execution of the second software application on the computing device. |
地址 |
Armonk NY US |